Symantec ZTNA Application Configuration Guide

Objective: Configure Symantec ZTNA to allow secure browser or native-client access (Web, RDP, SSH) to internal enterprise resources—without VPN.


Configure a Site

Purpose:
A Site represents a private network boundary that contains internal applications to be accessed through ZTNA. Every Connector must belong to a Site.

Steps:

  1. Log in to the ZTNA Console.
  2. Navigate to ZTNA → Sites → Add Site.
  3. Enter the following:
    • Name: HF_Home
    • Region: Choose the region closest to your physical location.
  4. Click Save.

Deploy a Connector

Purpose:
The Connector acts as the secure tunnel between the ZTNA Cloud and the internal network.
ZTNA supports Linux, Windows, and Docker deployment. The example below uses Docker.

Steps:

  1. Open the previously created HF_Home, then click Add Connector.
  2. Choose Deployment Type: Linux or Docker Compose .
  3. Copy the registration command displayed in the console.
  4. Once registration completes, the Connector status should show Online.

Ensure the host allows outbound TCP/443 access to ZTNA Cloud.


Configure a Collection

Purpose:
A Collection groups multiple Sites logically, enabling load balancing and redundancy across multiple Connectors.

Steps:

  1. Go to ZTNA → Collections → Add Collection.
  2. Enter:
    • Name: HF_Collection_01
    • Sites: Select HF_Home
  3. Click Save.

Create Access Policies

ZTNA access policies define who can access what type of application.
When creating a policy, you must select its Policy Type:

  • Web
  • RDP
  • SSH
  • Segment
  • SSH Gateway
  • TCP Tunnel

Example – Web Policy

  1. Navigate to ZTNA → Policies → Access Control → New – Web Access Policy.
  2. Configure:
    • Name: HF_Web_Policy
    • Assigned Entities: Select User or Group
    • Assigned Applications: Select the application to which this policy applies. Creating an application will be discussed in the next section.
  3. Save.

Add Applications

ZTNA supports several application types.
Each application must be assigned to a Collection and linked to its corresponding Policy Type.

Steps:

  1. Go to ZTNA → Applications → New – Web Application(in this example).
  2. Configure:
    • Name: HF-ESXI-01
    • Connection Type: Symantec ZTNA Domain
    • Internal Address: 172.16.30.1
    • Port: -
    • Policy: HF_Web_Policy
  3. Save.

Access Method:
Users can directly open the automatically generated external URL in a browser, e.g.

https://esxi.<tenant>.luminatesec.com

ZTNA establishes an encrypted tunnel and proxies the session to the internal web server.


Verify Access

  1. Ensure all Connectors show Online in the site.
  2. From a browser, access each application’s external URL.
  3. Validate successful connection.
  4. The Web application is shown here as an example. Other application types (RDP, SSH, etc.) follow a similar configuration process with minor variations in connection method.

If you prefer to use SAML-based authentication instead of local users, refer to my other article:
Integrating Azure Entra ID with Symantec ZTNA Using SAML + SCIM

Leave a Reply

Your email address will not be published. Required fields are marked *